Modern authentication scenarios for web access usually include federated identities with claims-based authentication (SAML, Oauth2, etc), which is rapidly becoming a de-facto standard, especially with rapid growth of BYOD devices on client side and SaaS apps on the server side....

Given the number of video conferencing solutions available, it can sometimes be daunting to choose what’s best for you. To help you reach the right decision, we’re presenting you some suggestions for small- to medium- and large-size spaces and meeting...

From its very beginnings, WiFi was a potent marketing platform, though not one which was always fully utilized. Advancement of modern technology made it possible to use various WiFi infrastructures and get useful insights into user behavior on our networks...

You just bought a new car, and it’s already infected with malware. You wouldn’t like to hear something like this. Neither would we. Your car manufacturer especially wouldn’t want to end up in the news. However, there is a good...

Tenable Black December: 10% Off Nessus Products Vulnerability scanning is an organized approach to testing, identifying, analyzing and reporting potential network security issues. Every time a device connects to the Internet, there’s a risk that a hacker will take advantage...

Let’s face it. There is no peace time. DDoS attacks are nothing new in the sphere of cyber threats. However, we are recently witnessing extremely large-scale DDoS attacks reaching Tbps levels with increased strength, frequency and complexity. It has become...

Recently we’ve noticed that more and more of our existing and future partners are inquiring about F5 Certification. As many of you already know, F5 has redesigned its certification program a few years ago and elevated it to a higher...

Are you justified in investing in a new WiFi infrastructure? Thinking of a low-cost “as long as it works” solution? What if you could get a return on at least some of these investments? Or if you completely turned your...

IP addresses are typically a very important part of any network and managing them can prove to be quite difficult due to their ever-growing number. As more and more IP addresses are needed for various apps, databases, microservices and other...